Skip to main content

IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages in IoT

  • Conference paper
  • First Online:
Computer Networks, Big Data and IoT

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 66))

  • 1644 Accesses

Abstract

In the Internet of Things (IoT) paradigm, devices involved will frequently face different types of attacks, for example flood attacks, eavesdropping attacks and so on. Once attackers have compromised the IoT device, the data materials of the IoT device will not remain confidential, and it will then be captured by the attacker; this will in turn threaten the entire network. Consequently, to safeguard IoTs, this paper proposes a public and secret key with token sharing (IoT-PSKTS) algorithm to avoid key leakages in IoT. Cryptography can be utilized for secure communication in the presence of attackers. In cryptography, a conventional public key cryptosystem will be suitable because they do not require the sender and receiver to deliver the same secret to contact without threat. But, they regularly depend on intricate mathematical calculations and are thus much more incompetent than comparable symmetric key cryptosystems. In a large number of applications, the high price of encrypting lengthy messages in public key cryptography can be prohibitive. A hybrid system tackles it by utilizing a mixture of both. In IoT network, admin generates a public key, private key, secret key and token. The public and secret key will be used for packet encryption in IoT devices and base station side, and the private key will be utilized for decryption in the admin side and token used for IoT devices access control. For encryption purpose, admin shares public and secret key with a token for IoT devices and base station. Therefore, PSKTS algorithm has been used to securely share the public and secret key with a token for IoT devices and base station in a distributed way. The experimental results show that the proposed PSKTS algorithm shares a public and secret key with token in a secured way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Carracedo JM, Milliken M, Chouhan PK, Scotney B, Lin Z (2018) Cryptography for security in Io. In: 2018 IEEE fifth international conference on internet of things: systems, management and security. ISBN: 978-1-5386-9585-2

    Google Scholar 

  2. Alramadhan M, Sha K (2017) An overview of access control mechanisms for the internet of thing. In: 2017 IEEE 26th International conference on computer communication and networks. ISBN: 978-1-5090-2991-4

    Google Scholar 

  3. Tang J, Song H, Xu A, Jiang Y, Wen H, Zhang Y, Qin K (2020) Secret sharing simultaneously on the internet of thing. In: 2020 IEEE international conference on power, intelligent computing and systems. ISBN: 978-1-7281-9874-3

    Google Scholar 

  4. Yousefi A, Jameii SM (2017) Improving the security of internet of things using encryption algorithm. In: 2017 IEEE international conference on IoT and application. ISBN: 978-1-5386-1698-7

    Google Scholar 

  5. Gunathilake NA, Buchanan WJ, Asif R (2019) Next generation lightweight cryptography for smart IoT devices: implementation, challenges and application. In: 2019 IEEE 5th world forum on internet of things. ISBN: 978-1-5386-4980-0

    Google Scholar 

  6. Terkawi A, Innab N, Amri SA, Amri AA (2018) Internet of things (IoT) increasing the necessity to adopt specific type of access control technique. In: 2018 IEEE 21st Saudi computer society national computer conference. ISBN: 978-1-5386-4110-1

    Google Scholar 

  7. Wang J, Wang H, Zhang H, Cao N (2017) Trust and attribute-based dynamic access control model for the internet of thing. In: 2017 IEEE international conference on cyber-enabled distributed computing and knowledge discovery. ISBN: 978-1-5386-2209-4

    Google Scholar 

  8. Surendran S, Nassef A, Beheshti BD (2018) A survey of cryptographic algorithms for IoT device. In: 2018 IEEE long Island systems, applications and technology conference. ISBN: 978-1-5386-5029-5

    Google Scholar 

  9. Miao L, Jiang D (2017) Optimal secret sharing for secure wireless communications in the era of internet of thing. In: 2017 IEEE 4th international conference on smart and sustainable city. ISBN: 978-1-78561-503-0

    Google Scholar 

  10. Farhadi M, Bypour H, Mortazavi R (2019) An efficient secret sharing-based storage system for cloud-based IoT. In: 2019 IEEE 16th international ISC conference on information security and cryptology. ISBN: 978-1-7281-4374-3

    Google Scholar 

  11. Fischlin M, Janson C, Mazaheri S (2018) Backdoored hash functions: immunizing HMAC and HKDF. In: 2018 IEEE 31st computer security foundations symposium (CSF). IEEE, pp 105–118

    Google Scholar 

  12. Suhaili SB, Watanabe T (2017) High-speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm. Adv Sci Lett 23(11):11096–11100

    Article  Google Scholar 

  13. Kishorebabu V, Sravanthi R (2020) Real-time monitoring of environmental parameters using IOT. Wireless Pers Commun 8:1–24

    Google Scholar 

  14. Kusuma HA, Anjasmara R, Suhendra T, Yunianto H, Nugraha S (2020) An IoT based coastal weather and air quality monitoring using GSM technology. J Phys Conf Ser 1501(1):012004

    Google Scholar 

  15. Buchanan WJ, Lanc D, Ukwandu E, Fan L, Russell G, Lo O (2015) The future internet: a world of secret share. Future Internet 7:445–464. https://doi.org/10.3390/fi7040445

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Pradeepa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pradeepa, K., Parveen, M. (2021). IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages in IoT. In: Pandian, A., Fernando, X., Islam, S.M.S. (eds) Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 66. Springer, Singapore. https://doi.org/10.1007/978-981-16-0965-7_62

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0965-7_62

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0964-0

  • Online ISBN: 978-981-16-0965-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics